Skip to content

lameiro0x/pentesting-path-htb

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

32 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

HTB – Cybersecurity Study Notes & Methodology

This repository contains a structured collection of cybersecurity technical notes, developed through study and hands-on practice on Hack The Box (HTB). It is part of my university training and preparation for professional cybersecurity internships.

Beyond theoretical notes, this repository is designed as a real working tool, actively used to solve HTB machines, labs, and practical scenarios by combining theory, commands, and methodology.


🎯 Repository Purpose

The main objective of this repository is to demonstrate:

  • Ability for self-directed and continuous learning
  • Clear organization of complex technical knowledge
  • A practical and methodological pentesting approach
  • Use of documentation as direct support when solving machines
  • A process-oriented mindset, not just tool usage

This repository reflects how I work, not just what I know.


📁 Repository Structure

The content follows the same logic as a real penetration testing workflow, clearly separating theory, execution, and decision-making.

Penetration Tester Path
├── Academy
│   ├── 1. Information Gathering
│   ├── 2. Vulnerability Assesment
│   ├── 3. Exploitation
│   └── 4. Post-Exploitation
│
├── Comandos
│   ├── 1. Information Gathering
│   ├── 2. Vulnerability Assesment
│   ├── 3. Exploitation
│   └── 4. Post Exploitation
│
├── Modus Operandi General.md
└── Proceso de Pruebas de Penetracion.md

🔹 Academy/ – Applied theoretical foundation

Contains theoretical notes based on HTB Academy modules:

  • Networking, operating systems, Linux, Windows, Active Directory, etc.
  • Personal summaries focused on understanding the reasoning behind techniques
  • Designed for quick consultation while solving machines

🔹 Comandos/ – Execution and technique

Contains the operational side of the knowledge:

  • Real commands used in HTB labs
  • Enumeration, exploitation, and post-exploitation techniques
  • Reproducible examples
  • Files organized by technology and attack phase

This is where theory from Academy is applied in practice.


🔹 Modus Operandi – Decision-making guidance

The Modus Operandi files act as decision-flow guides:

  • Indicate what to do at each phase
  • Link directly to the relevant command files
  • Help maintain context during machine resolution
  • Reduce improvisation and reinforce structured reasoning

This approach is what I use to solve HTB machines in a systematic way, not by trial and error.


🔗 Navigation and usage

  • The repository is fully functional on GitHub:
    • Navigable indexes
    • Standard Markdown links
    • Properly referenced images
  • However, the best user experience is achieved in Obsidian, as it provides:
    • Graph-based visualization
    • Native wikilinks
    • Non-linear knowledge navigation

This repository is originally created in Obsidian and later adapted for GitHub without losing usability.


🛠 Obsidian to GitHub conversion

The scripts used to convert these notes from Obsidian to a GitHub-compatible format (wikilinks, indexes, anchors, and images) are maintained in a separate personal repository:

🔗 https://github.com/lameiro0x/obsidian-to-github-md

That repository includes:

  • Automatic conversion of wikilinks to Markdown
  • GitHub-compatible index generation
  • Anchor normalization
  • Image path handling

This repository focuses exclusively on the technical content, not the conversion tooling.


🧠 Practical focus

These notes are not just documentation:

  • They are actively used when solving HTB machines
  • They allow fast transition from theory → action
  • They enable technique reuse across different scenarios
  • They reinforce methodological consistency

They represent a realistic way of working in cybersecurity.


Project Status

This repository is a work in progress.

The Hack The Box Academy Pentesting Path is not yet fully completed, and this repository is continuously updated as I advance through the path.

The final objective of this project is to have a complete, structured, and practical knowledge base covering the entire HTB Academy Pentesting Path, serving both as a personal reference and as a demonstration of my learning process and methodology in offensive security.


⚠️ Ethical and legal notice

All content has been developed exclusively in:

  • Controlled and legal environments
  • Hack The Box educational labs
  • With no use against real or unauthorized systems

👤 Author

Computer Engineering student with a strong interest in Cybersecurity, combining academic training with intensive hands-on practice.

This repository is part of my technical portfolio for university internships and early professional opportunities in cybersecurity.

About

This repository contains a structured collection of cybersecurity technical notes, developed through study and hands-on practice on Hack The Box (HTB). It is part of my university training and preparation for professional cybersecurity internships.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors